This MIB module defines configuration objects for managing IPsec Security Policies. In general, this MIB can be implemented anywhere IPsec security services exist (e.g., bump-in-the-wire, host, gateway, firewall, router, etc.). Copyright (C) The IETF Trust (2007). This version of this MIB module is part of RFC 4807; see the RFC itself for full legal notices. |
diffServMultiFieldClfrNextFree, IfDirection, diffServMIBMultiFieldClfrGroup | DIFFSERV-MIB |
InterfaceIndex | IF-MIB |
InetAddress, InetAddressType | INET-ADDRESS-MIB |
SnmpAdminString | SNMP-FRAMEWORK-MIB |
NOTIFICATION-GROUP, OBJECT-GROUP, MODULE-COMPLIANCE | SNMPv2-CONF |
OBJECT-TYPE, mib-2, Unsigned32, Integer32, NOTIFICATION-TYPE, MODULE-IDENTITY | SNMPv2-SMI |
VariablePointer, StorageType, TimeStamp, TruthValue, RowStatus, TEXTUAL-CONVENTION | SNMPv2-TC |
Name | Base Type | Values/Constraints |
---|---|---|
Enumeration | enabled(1), disabled(2) | |
Enumeration | or(1), and(2) | |
Integer32 | range: -1..65535 | |
OctetString | range: 0..31 |
![]() | .1.3.6.1.2.1.153 | |
![]() | .1.3.6.1.2.1.153.1 | |
![]() | .1.3.6.1.2.1.153.1.1 | |
![]() | .1.3.6.1.2.1.153.1.1.1 | |
![]() | .1.3.6.1.2.1.153.1.1.2 | |
![]() | .1.3.6.1.2.1.153.1.10 | |
![]() | .1.3.6.1.2.1.153.1.10.1 | |
![]() | .1.3.6.1.2.1.153.1.10.1.1 | |
![]() | .1.3.6.1.2.1.153.1.10.1.2 | |
![]() | .1.3.6.1.2.1.153.1.10.1.3 | |
![]() | .1.3.6.1.2.1.153.1.10.1.4 | |
![]() | .1.3.6.1.2.1.153.1.10.1.5 | |
![]() | .1.3.6.1.2.1.153.1.10.1.6 | |
![]() | .1.3.6.1.2.1.153.1.10.1.7 | |
![]() | .1.3.6.1.2.1.153.1.11 | |
![]() | .1.3.6.1.2.1.153.1.11.1 | |
![]() | .1.3.6.1.2.1.153.1.11.1.1 | |
![]() | .1.3.6.1.2.1.153.1.11.1.2 | |
![]() | .1.3.6.1.2.1.153.1.11.1.3 | |
![]() | .1.3.6.1.2.1.153.1.11.1.4 | |
![]() | .1.3.6.1.2.1.153.1.11.1.5 | |
![]() | .1.3.6.1.2.1.153.1.12 | |
![]() | .1.3.6.1.2.1.153.1.12.1 | |
![]() | .1.3.6.1.2.1.153.1.12.1.1 | |
![]() | .1.3.6.1.2.1.153.1.12.1.2 | |
![]() | .1.3.6.1.2.1.153.1.12.1.3 | |
![]() | .1.3.6.1.2.1.153.1.12.1.4 | |
![]() | .1.3.6.1.2.1.153.1.12.1.5 | |
![]() | .1.3.6.1.2.1.153.1.13 | |
![]() | .1.3.6.1.2.1.153.1.13.1 | |
![]() | .1.3.6.1.2.1.153.1.13.2 | |
![]() | .1.3.6.1.2.1.153.1.13.3 | |
![]() | .1.3.6.1.2.1.153.1.13.4 | |
![]() | .1.3.6.1.2.1.153.1.2 | |
![]() | .1.3.6.1.2.1.153.1.2.1 | |
![]() | .1.3.6.1.2.1.153.1.2.1.1 | |
![]() | .1.3.6.1.2.1.153.1.2.1.2 | |
![]() | .1.3.6.1.2.1.153.1.2.1.3 | |
![]() | .1.3.6.1.2.1.153.1.2.1.4 | |
![]() | .1.3.6.1.2.1.153.1.2.1.5 | |
![]() | .1.3.6.1.2.1.153.1.2.1.6 | |
![]() | .1.3.6.1.2.1.153.1.3 | |
![]() | .1.3.6.1.2.1.153.1.3.1 | |
![]() | .1.3.6.1.2.1.153.1.3.1.1 | |
![]() | .1.3.6.1.2.1.153.1.3.1.2 | |
![]() | .1.3.6.1.2.1.153.1.3.1.3 | |
![]() | .1.3.6.1.2.1.153.1.3.1.4 | |
![]() | .1.3.6.1.2.1.153.1.3.1.5 | |
![]() | .1.3.6.1.2.1.153.1.3.1.6 | |
![]() | .1.3.6.1.2.1.153.1.3.1.7 | |
![]() | .1.3.6.1.2.1.153.1.3.1.8 | |
![]() | .1.3.6.1.2.1.153.1.4 | |
![]() | .1.3.6.1.2.1.153.1.4.1 | |
![]() | .1.3.6.1.2.1.153.1.4.1.1 | |
![]() | .1.3.6.1.2.1.153.1.4.1.2 | |
![]() | .1.3.6.1.2.1.153.1.4.1.3 | |
![]() | .1.3.6.1.2.1.153.1.4.1.4 | |
![]() | .1.3.6.1.2.1.153.1.4.1.5 | |
![]() | .1.3.6.1.2.1.153.1.4.1.6 | |
![]() | .1.3.6.1.2.1.153.1.4.1.7 | |
![]() | .1.3.6.1.2.1.153.1.4.1.8 | |
![]() | .1.3.6.1.2.1.153.1.4.1.9 | |
![]() | .1.3.6.1.2.1.153.1.5 | |
![]() | .1.3.6.1.2.1.153.1.5.1 | |
![]() | .1.3.6.1.2.1.153.1.5.1.1 | |
![]() | .1.3.6.1.2.1.153.1.5.1.2 | |
![]() | .1.3.6.1.2.1.153.1.5.1.3 | |
![]() | .1.3.6.1.2.1.153.1.5.1.4 | |
![]() | .1.3.6.1.2.1.153.1.5.1.5 | |
![]() | .1.3.6.1.2.1.153.1.5.1.6 | |
![]() | .1.3.6.1.2.1.153.1.6 | |
![]() | .1.3.6.1.2.1.153.1.6.1 | |
![]() | .1.3.6.1.2.1.153.1.6.1.1 | |
![]() | .1.3.6.1.2.1.153.1.6.1.2 | |
![]() | .1.3.6.1.2.1.153.1.6.1.3 | |
![]() | .1.3.6.1.2.1.153.1.6.1.4 | |
![]() | .1.3.6.1.2.1.153.1.6.1.5 | |
![]() | .1.3.6.1.2.1.153.1.6.1.6 | |
![]() | .1.3.6.1.2.1.153.1.7 | |
![]() | .1.3.6.1.2.1.153.1.7.1 | |
![]() | .1.3.6.1.2.1.153.1.7.1.0 | |
![]() | .1.3.6.1.2.1.153.1.8 | |
![]() | .1.3.6.1.2.1.153.1.8.1 | |
![]() | .1.3.6.1.2.1.153.1.8.1.1 | |
![]() | .1.3.6.1.2.1.153.1.8.1.2 | |
![]() | .1.3.6.1.2.1.153.1.8.1.3 | |
![]() | .1.3.6.1.2.1.153.1.8.1.4 | |
![]() | .1.3.6.1.2.1.153.1.8.1.5 | |
![]() | .1.3.6.1.2.1.153.1.8.1.6 | |
![]() | .1.3.6.1.2.1.153.1.8.1.7 | |
![]() | .1.3.6.1.2.1.153.1.9 | |
![]() | .1.3.6.1.2.1.153.1.9.1 | |
![]() | .1.3.6.1.2.1.153.1.9.1.1 | |
![]() | .1.3.6.1.2.1.153.1.9.1.2 | |
![]() | .1.3.6.1.2.1.153.1.9.1.3 | |
![]() | .1.3.6.1.2.1.153.1.9.1.4 | |
![]() | .1.3.6.1.2.1.153.1.9.1.5 | |
![]() | .1.3.6.1.2.1.153.1.9.1.6 | |
![]() | .1.3.6.1.2.1.153.1.9.1.7 | |
![]() | .1.3.6.1.2.1.153.1.9.1.8 | |
![]() | .1.3.6.1.2.1.153.1.9.1.9 | |
![]() | .1.3.6.1.2.1.153.2 | |
![]() | .1.3.6.1.2.1.153.2.0 | |
![]() | .1.3.6.1.2.1.153.2.1 | |
![]() | .1.3.6.1.2.1.153.2.1.1 | |
![]() | .1.3.6.1.2.1.153.2.1.2 | |
![]() | .1.3.6.1.2.1.153.2.1.3 | |
![]() | .1.3.6.1.2.1.153.2.1.4 | |
![]() | .1.3.6.1.2.1.153.2.1.5 | |
![]() | .1.3.6.1.2.1.153.2.1.6 | |
![]() | .1.3.6.1.2.1.153.2.1.7 | |
![]() | .1.3.6.1.2.1.153.2.1.8 | |
![]() | .1.3.6.1.2.1.153.2.1.9 | |
![]() | .1.3.6.1.2.1.153.3 | |
![]() | .1.3.6.1.2.1.153.3.1 | |
![]() | .1.3.6.1.2.1.153.3.2 | |
![]() | .1.3.6.1.2.1.153.4 |
Name | OID | Description |
---|---|---|
.1.3.6.1.2.1.153.2.0.1 | on that an action was executed by a rule. Only actions with logging enabled will result in this notification getting sent. The object includes the spdActionExecuted object, which will indicate which action was executed within the scope of the rule. Additionally, the spdIPSourceType, spdIPSourceAddress, spdIPDestinationType, and spdIPDestinationAddress objects are included to indicate the packet source and destination of the packet that triggered the action. Finally, the spdIPEndpointAddType, spdIPEndpointAddress, and spdPacketDirection objects indicate which interface the executed action was associated with, and if the packet was ingress or egress through the endpoint. A spdActionNotification SHOULD be limited to a maximum of one notification sent per minute for any action notifications that do not have any other configuration controlling their send rate. Note that compound actions with multiple executed sub-actions may result in multiple notifications being sent from a single rule execution. | |
.1.3.6.1.2.1.153.2.0.2 | on that a packet passed through a Security Association (SA). Only SAs created by actions with packet logging enabled will result in this notification getting sent. The objects sent MUST include the spdActionExecuted, which will indicate which action was executed within the scope of the rule. Additionally, the spdIPSourceType, spdIPSourceAddress, spdIPDestinationType, and spdIPDestinationAddress objects MUST be included to indicate the packet source and destination of the packet that triggered the action. The spdIPEndpointAddType, spdIPEndpointAddress, and spdPacketDirection objects are included to indicate which endpoint the packet was associated with. Finally, spdPacketPart is included to enable sending a variable sized part of the front of the packet with the size dependent on the value of the object of TC syntax 'SpdIPPacketLogging', which indicated that logging should be done. A spdPacketNotification SHOULD be limited to a maximum of one notification sent per minute for any action notifications that do not have any other configuration controlling their send rate. An action notification SHOULD be limited to a maximum of one notification sent per minute for any action notifications that do not have any other configuration controlling their send rate. |